Kusen, Ema; Strembeck, Mark
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research....

Striessnig, Erich
While education has played a strong role in the ancient debate on the necessary preconditions for the good life, the contemporary literature on subjective well-being has not paid much attention to the possibility of education having an independent effect on happiness. Typically, education is mentioned only as having indirect effects, e.g., through its effect on income and wealth, employment status, health and mortality, marriage success, or as a proxy for socioconomic status. Also, the view that education - like income - mainly raises aspirations and therefore leads to lower levels of happiness is widespread in the literature, mostly without empirical...

Kusen, Ema; Strembeck, Mark
Context: This protocol is as a supplementary document to our review paper that investigates security-related challenges and solutions that have occurred during the past decade (from January 2003 to December 2014). Objectives: The objective of this systematic review is to identify security-related challenges, security goals, and defenses in ubiquitous computing by answering to three main research questions. First, demographic data and trends will be given by analyzing where, when and by whom the research has been carried out. Second, we will identify security goals that occur in ubiquitous computing, along with attacks, vulnerabilities and threats that have motivated the research....